A novel approach to the security evaluation of information system is presented.
提出了一种新颖的安全评估方法。
This article holds that the oil security evaluation index system is foundation.
本文认为,构建石油安全评价指标体系是评价工作的基础。
This paper introduces the ASI and its syntax, mechanism, and security evaluation.
该文介绍了ASI的概念及它的语法、机制和安全评估。
The "down three zone" theory provides theoretical foundation for security evaluation.
下三带理论为分析、评价底板抗突水能力提供了理论指导。
The" down three zone" theory provides theoretical foundation for security evaluation.
下三带理论为分析、价底板抗突水能力提供了理论指导。
The IAHP can quantify the effect of the evaluation parameters on security evaluation results.
改进的AHP方法可以有效地量化评估参数对评估结果的影响;
The security evaluation of transmission grid is an important and frequent work for power grid business.
输电网安全性评价是电网企业安全管理的一项重要的经常性的工作。
It is crucial to investigate the parameter which effect decisively on the result of security evaluation.
研究评估参数对安全评估结果的影响具有重要意义。
At last a security evaluation to this system is given according to the current means to attack the mail system.
最后根据当前常用的电子邮件攻击手段给出该系统的安全评估。
Recently, there has been an effort to consolidate these best practices as the Common Criteria for IT Security Evaluation (CC).
最近,业界已经作出了很大的努力,来这些最佳实践合并作为IT安全评估通用标准(Common Criteriafor IT Security Evaluation,CC)。
The main research content of this paper is network information detection technology and network security evaluation method.
本文主要研究的内容是网络信息的探测技术和建立在信息探测基础上的安全评估方法。
Through searching the problem of network security evaluation, this paper presents an algorithm to evaluate network security.
对网络系统安全评估问题进行了研究,提出了一种评估网络系统安全的新算法。
Due to the absence of evaluation theory, most of the security evaluation is informal, random, and low efficient in practice.
由于当前评估理论的匮乏,导致实际中相当多的安全评估不规范,随意,低效率。
Compared with the existing security evaluation and forecast methods, the proposed model is more integrated, effective and accurate.
相比已有的安全态势评估和预测方法,该模型的结构更加完整,结果更为准确有效。
The index of network security evaluation is used to evaluate network security and indicate the security property of telecom network.
网络安全评估指标是网络安全评估的工具,是反映电信网安全属性的标志。
Environmental security evaluation system of high-rise buildings was established based on analysis of impact factors of environment security.
详细分析并确定高层建筑的环境安全影响因子,在此基础上构建了高层建筑的环境安全评价体系。
Therefore, the analysis of influence of base rock condition on earthquake affecting coefficient is necessary for earthquake security evaluation.
如何分析基岩条件对地震影响系数的影响是地震安全评价的关键工作之一。
Power system state estimation is the core of electric energy management system and the bases of dispatch, control, security evaluation and so on.
电力系统状态估计是电力系统调度、控制、安全评估等方面的基础,也是电能管理系统的核心组成部分。
The difficulty of network security evaluation is how to select and analyze the factors and their attributes, which are highly important to network security.
网络安全评估的难点在于如何选择和分析各种影响网络安全的因素及其属性。
Network security leak scan and vulnerability analysis are the base of system security evaluation and the essential components of Information security system.
网络安全漏洞扫描与脆弱性分析是进行系统安全评估的基础和信息安全保障体系中的必要组成部分。
Through the analysis of Bayesian net's applicability in computer network security evaluation, this paper presents a novel method to evaluate network security.
通过分析贝叶斯网络在计算机网络安全评估中的适用性,提出了一种新的网络安全评估方法。
The fuzzy evaluation model of environment security was also built, which was expected to provide a reference to scale security evaluation of high-rise buildings.
同时,提出了高层建筑的环境安全单方面的灰色关联评价及整体的模糊综合评价模型及运行步骤。
In the face of these accident, setting up one intact security evaluation system to guide equipment management of enterprise become an urgent problem to be solved.
面对这些事故,建立一套完整的安全评估体系用于指导企业的设备管理成为一个迫切需要解决的问题。
The evolution history of computer security evaluation criteria and the application of security evaluation criteria to the evaluation of security products are analyzed.
分析计算机系统安全标准的演化过程,以及安全评价标准在安全产品评价中的实际应用情况。
Because of explosive materials is a kind of combustible and detonable product, so it is necessary that security evaluation should be conducted systematically and seriously.
民爆器材是一种广泛应用的易燃易爆品,它的安全性评价是系统的、细致的和必要的。
The paper based on the research of industrial security theory and industrial security evaluation, argues that the existing industrial security evaluation have some limited.
本文通过对产业安全理论和评价的研究,认为现有的产业安全评价模型具有一定的局限性。
The necessity of evaluation on the environmental security of transgenic rice plants was addressed. The author gives his personal views about the contents for security evaluation.
阐述了转基因水稻抗病植株环境安全性评价的必要性,对环境安全性评价内容提出了个人观点。
During the process all the security evaluation information is reserved by fuzzy judgment of center of gravity, and gives prominent to key items by assignment of center of gravity.
评价过程中通过采用模糊重心评价方法,保留了所有的系统安全评价信息,且通过重心分配,突出重要的评价项目。
During the process all the security evaluation information is reserved by fuzzy judgment of center of gravity, and gives prominent to key items by assignment of center of gravity.
评价过程中通过采用模糊重心评价方法,保留了所有的系统安全评价信息,且通过重心分配,突出重要的评价项目。
应用推荐